ALT-BU-2018-3579-1
Branch c8.1 update bulletin.
Package LibreOffice updated to version 6.0.7.3-alt0.M80C.1 for branch c8.1 in task 215409.
Closed vulnerabilities
BDU:2017-01193
Уязвимость функции ReadJPEG пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2017-01264
Уязвимость функции EnhWMFReader::ReadEnhWMF пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код
BDU:2017-01548
Уязвимость функции HWPFile::TagsRead пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01549
Уязвимость функции tools::Polygon::Insert пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01555
Уязвимость функции SVMConverter::ImplConvertFromSVM1 пакета офисных программ LibreOffice, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00713
Уязвимость функции SwCTBWrapper :: Read пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-00714
Уязвимость компонента COM.MICROSOFT.WEBSERVICE пакета офисных программ LibreOffice, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2019-00715
Уязвимость функции SwCTBWrapper :: Read пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-00786
Уязвимость пакета офисных программ LibreOffice, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-20
CVE-2016-10327
LibreOffice before 2016-12-22 has an out-of-bounds write caused by a heap-based buffer overflow related to the EnhWMFReader::ReadEnhWMF function in vcl/source/filter/wmf/enhwmf.cxx.
- http://www.libreoffice.org/about-us/security/advisories/cve-2016-10327/
- http://www.securityfocus.com/bid/97668
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=313
- https://github.com/LibreOffice/core/commit/7485fc2a1484f31631f62f97e5c64c0ae74c6416
- https://security.gentoo.org/glsa/201706-28
- http://www.libreoffice.org/about-us/security/advisories/cve-2016-10327/
- http://www.securityfocus.com/bid/97668
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=313
- https://github.com/LibreOffice/core/commit/7485fc2a1484f31631f62f97e5c64c0ae74c6416
- https://security.gentoo.org/glsa/201706-28
Modified: 2025-04-20
CVE-2017-14226
WP1StylesListener.cpp, WP5StylesListener.cpp, and WP42StylesListener.cpp in libwpd 0.10.1 mishandle iterators, which allows remote attackers to cause a denial of service (heap-based buffer over-read in the WPXTableList class in WPXTable.cpp). This vulnerability can be triggered in LibreOffice before 5.3.7. It may lead to suffering a remote attack against a LibreOffice application.
- https://bugs.documentfoundation.org/show_bug.cgi?id=112269
- https://bugzilla.redhat.com/show_bug.cgi?id=1489337
- https://cgit.freedesktop.org/libreoffice/core/commit/?id=dd89afa6ee8166b69e7a1e86f22616ca8fc122c9
- https://sourceforge.net/p/libwpd/code/ci/0329a9c57f9b3b0efa0f09a5235dfd90236803a5/
- https://sourceforge.net/p/libwpd/code/ci/f40827b3eae260ce657c67d9fecc855b09dea3c3/
- https://sourceforge.net/p/libwpd/tickets/14/
- https://bugs.documentfoundation.org/show_bug.cgi?id=112269
- https://bugzilla.redhat.com/show_bug.cgi?id=1489337
- https://cgit.freedesktop.org/libreoffice/core/commit/?id=dd89afa6ee8166b69e7a1e86f22616ca8fc122c9
- https://sourceforge.net/p/libwpd/code/ci/0329a9c57f9b3b0efa0f09a5235dfd90236803a5/
- https://sourceforge.net/p/libwpd/code/ci/f40827b3eae260ce657c67d9fecc855b09dea3c3/
- https://sourceforge.net/p/libwpd/tickets/14/
Modified: 2025-04-20
CVE-2017-7856
LibreOffice before 2017-03-11 has an out-of-bounds write caused by a heap-based buffer overflow in the SVMConverter::ImplConvertFromSVM1 function in vcl/source/gdi/svmconverter.cxx.
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7856/
- http://www.securityfocus.com/bid/97667
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=817
- https://github.com/LibreOffice/core/commit/28e61b634353110445e334ccaa415d7fb6629d62
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7856/
- http://www.securityfocus.com/bid/97667
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=817
- https://github.com/LibreOffice/core/commit/28e61b634353110445e334ccaa415d7fb6629d62
Modified: 2025-04-20
CVE-2017-7870
LibreOffice before 2017-01-02 has an out-of-bounds write caused by a heap-based buffer overflow related to the tools::Polygon::Insert function in tools/source/generic/poly.cxx.
- http://www.debian.org/security/2017/dsa-3837
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7870/
- http://www.securityfocus.com/bid/97671
- http://www.securitytracker.com/id/1039029
- https://access.redhat.com/errata/RHSA-2017:1975
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=372
- https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722
- https://security.gentoo.org/glsa/201706-28
- http://www.debian.org/security/2017/dsa-3837
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7870/
- http://www.securityfocus.com/bid/97671
- http://www.securitytracker.com/id/1039029
- https://access.redhat.com/errata/RHSA-2017:1975
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=372
- https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722
- https://security.gentoo.org/glsa/201706-28
Modified: 2025-04-20
CVE-2017-7882
LibreOffice before 2017-03-14 has an out-of-bounds write related to the HWPFile::TagsRead function in hwpfilter/source/hwpfile.cxx.
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7882/
- http://www.securityfocus.com/bid/97684
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=860
- https://github.com/LibreOffice/core/commit/65dcd1d8195069c8c8acb3a188b8e5616c51029c
- http://www.libreoffice.org/about-us/security/advisories/cve-2017-7882/
- http://www.securityfocus.com/bid/97684
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=860
- https://github.com/LibreOffice/core/commit/65dcd1d8195069c8c8acb3a188b8e5616c51029c
Modified: 2025-04-20
CVE-2017-8358
LibreOffice before 2017-03-17 has an out-of-bounds write caused by a heap-based buffer overflow related to the ReadJPEG function in vcl/source/filter/jpeg/jpegc.cxx.
- http://www.securityfocus.com/bid/98395
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=889
- https://github.com/LibreOffice/core/commit/6e6e54f944a5ebb49e9110bdeff844d00a96c56c
- http://www.securityfocus.com/bid/98395
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=889
- https://github.com/LibreOffice/core/commit/6e6e54f944a5ebb49e9110bdeff844d00a96c56c
Modified: 2024-11-21
CVE-2018-10119
sot/source/sdstor/stgstrms.cxx in LibreOffice before 5.4.5.1 and 6.x before 6.0.1.1 uses an incorrect integer data type in the StgSmallStrm class, which allows remote attackers to cause a denial of service (use-after-free with write access) or possibly have unspecified other impact via a crafted document that uses the structured storage ole2 wrapper file format.
- https://access.redhat.com/errata/RHSA-2018:3054
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5747
- https://gerrit.libreoffice.org/#/c/48751/
- https://gerrit.libreoffice.org/#/c/48756/
- https://gerrit.libreoffice.org/#/c/48757/
- https://gerrit.libreoffice.org/#/c/48758/
- https://gerrit.libreoffice.org/gitweb?p=core.git%3Ba=commit%3Bh=fdd41c995d1f719e92c6f083e780226114762f05
- https://lists.debian.org/debian-lts-announce/2018/04/msg00021.html
- https://usn.ubuntu.com/3883-1/
- https://www.debian.org/security/2018/dsa-4178
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-10119/
- https://access.redhat.com/errata/RHSA-2018:3054
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5747
- https://gerrit.libreoffice.org/#/c/48751/
- https://gerrit.libreoffice.org/#/c/48756/
- https://gerrit.libreoffice.org/#/c/48757/
- https://gerrit.libreoffice.org/#/c/48758/
- https://gerrit.libreoffice.org/gitweb?p=core.git%3Ba=commit%3Bh=fdd41c995d1f719e92c6f083e780226114762f05
- https://lists.debian.org/debian-lts-announce/2018/04/msg00021.html
- https://usn.ubuntu.com/3883-1/
- https://www.debian.org/security/2018/dsa-4178
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-10119/
Modified: 2024-11-21
CVE-2018-10120
The SwCTBWrapper::Read function in sw/source/filter/ww8/ww8toolbar.cxx in LibreOffice before 5.4.6.1 and 6.x before 6.0.2.1 does not validate a customizations index, which allows remote attackers to cause a denial of service (heap-based buffer overflow with write access) or possibly have unspecified other impact via a crafted document that contains a certain Microsoft Word record.
- https://access.redhat.com/errata/RHSA-2018:3054
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6173
- https://gerrit.libreoffice.org/#/c/49486/
- https://gerrit.libreoffice.org/#/c/49499/
- https://gerrit.libreoffice.org/#/c/49500/
- https://gerrit.libreoffice.org/gitweb?p=core.git%3Ba=commit%3Bh=017fcc2fcd00af17a97bd5463d89662404f57667
- https://lists.debian.org/debian-lts-announce/2018/04/msg00021.html
- https://usn.ubuntu.com/3883-1/
- https://www.debian.org/security/2018/dsa-4178
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-10120/
- https://access.redhat.com/errata/RHSA-2018:3054
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6173
- https://gerrit.libreoffice.org/#/c/49486/
- https://gerrit.libreoffice.org/#/c/49499/
- https://gerrit.libreoffice.org/#/c/49500/
- https://gerrit.libreoffice.org/gitweb?p=core.git%3Ba=commit%3Bh=017fcc2fcd00af17a97bd5463d89662404f57667
- https://lists.debian.org/debian-lts-announce/2018/04/msg00021.html
- https://usn.ubuntu.com/3883-1/
- https://www.debian.org/security/2018/dsa-4178
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-10120/
Modified: 2024-11-21
CVE-2018-14939
The get_app_path function in desktop/unx/source/start.c in LibreOffice through 6.0.5 mishandles the realpath function in certain environments such as FreeBSD libc, which might allow attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact if LibreOffice is automatically launched during web browsing with pathnames controlled by a remote web site.
Modified: 2024-11-21
CVE-2018-16858
It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python method from a script in any arbitrary file system location, specified relative to the LibreOffice install location.
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00059.html
- http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html
- http://www.rapid7.com/db/modules/exploit/multi/fileformat/libreoffice_macro_exec
- https://access.redhat.com/errata/RHSA-2019:2130
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16858
- https://seclists.org/bugtraq/2019/Aug/28
- https://www.exploit-db.com/exploits/46727/
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-16858/
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00059.html
- http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html
- http://www.rapid7.com/db/modules/exploit/multi/fileformat/libreoffice_macro_exec
- https://access.redhat.com/errata/RHSA-2019:2130
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16858
- https://seclists.org/bugtraq/2019/Aug/28
- https://www.exploit-db.com/exploits/46727/
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-16858/
Modified: 2024-11-21
CVE-2018-6871
LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read arbitrary files via =WEBSERVICE calls in a document, which use the COM.MICROSOFT.WEBSERVICE function.
- https://access.redhat.com/errata/RHSA-2018:0418
- https://access.redhat.com/errata/RHSA-2018:0517
- https://cgit.freedesktop.org/libreoffice/core/commit/?h=libreoffice-5-4-5&id=a916fc0c0e0e8b10cb4158fa0fa173fe205d434a
- https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure
- https://usn.ubuntu.com/3579-1/
- https://www.debian.org/security/2018/dsa-4111
- https://www.exploit-db.com/exploits/44022/
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/
- https://access.redhat.com/errata/RHSA-2018:0418
- https://access.redhat.com/errata/RHSA-2018:0517
- https://cgit.freedesktop.org/libreoffice/core/commit/?h=libreoffice-5-4-5&id=a916fc0c0e0e8b10cb4158fa0fa173fe205d434a
- https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure
- https://usn.ubuntu.com/3579-1/
- https://www.debian.org/security/2018/dsa-4111
- https://www.exploit-db.com/exploits/44022/
- https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/
Package token-manager updated to version 0.12-alt4.git51687e2 for branch c8.1 in task 215412.
Closed bugs
Неправильный вызов КриптоПро